Dahua DH-PFS4226-24GT2GF-360 Quick Start Manual Download Page 18

 

12 

Appendix 1 Cybersecurity Recommendations 

Cybersecurity is more than just a buzzword: it

’s something that pertains to every device that is 

connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic 

steps toward protecting and strengthening networks and networked appliances will make them 

less susceptible to attacks. Below are some tips and recommendations on how to create a 

more secured security system. 

Mandatory actions to be taken for basic device network security:

 

1. 

Use Strong Passwords

 

Please refer to the following suggestions to set passwords: 
●  The length should not be less than 8 characters; 
●  Include at least two types of characters; character types include upper and lower case 

letters, numbers and symbols; 

●  Do not contain the account name or the account name in reverse order; 
●  Do not use continuous characters, such as 123, abc, etc.; 
●  Do not use overlapped characters, such as 111, aaa, etc.; 

2. 

Update Firmware and Client Software in Time

 

●  According to the standard procedure in Tech-industry, we recommend to keep your 

device (such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the system is 

equipped with the latest security patches and fixes. When the device is connected to the 

public network, it is recommended to enable the 

“auto-check for updates” function to 

obtain timely information of firmware updates released by the manufacturer. 

●  We suggest that you download and use the latest version of client software. 

"Nice to have" recommendations to improve your device network security:

 

1. 

Physical Protection

 

We suggest that you perform physical protection to device, especially storage devices. For 

example, place the device in a special computer room and cabinet, and implement 

well-done access control permission and key management to prevent unauthorized 

personnel from carrying out physical contacts such as damaging hardware, unauthorized 

connection of removable device (such as USB flash disk, serial port), etc. 

2. 

Change Passwords Regularly

 

We suggest that you change passwords regularly to reduce the risk of being guessed or 

cracked. 

3. 

Set and Update Passwords Reset Information Timely

 

The device supports password reset function. Please set up related information for 

password reset in time, including the end user

’s mailbox and password protection questions. 

If the information changes, please modify it in time. When setting password protection 

questions, it is suggested not to use those that can be easily guessed. 

4. 

Enable Account Lock

 

The account lock feature is enabled by default, and we recommend you to keep it on to 

guarantee the account security. If an attacker attempts to log in with the wrong password 

several times, the corresponding account and the source IP address will be locked. 

5. 

Change Default HTTP and Other Service Ports

 

We suggest you to change default HTTP and other service ports into any set of numbers 

between 1024~65535, reducing the risk of outsiders being able to guess which ports you 

are using. 

Summary of Contents for DH-PFS4226-24GT2GF-360

Page 1: ...16 24 Port Gigabit Managed PoE Switch Quick Start Guide V1 0 1...

Page 2: ...and the actual product the actual product shall prevail We are not liable for any loss caused by the operations that do not comply with the manual The manual would be updated according to the latest...

Page 3: ...II occurring when using the device If there is any uncertainty or controversy we reserve the right of final explanation...

Page 4: ...n and other dangers Replace the battery with battery of the same type Use locally recommended power cord in the limit of rated specifications Use the standard power adapter We will assume no responsib...

Page 5: ...IV environment crush puncture cut or incinerate Dispose of the battery as required by local ordinances or regulations...

Page 6: ...1 2 Device Structure 3 2 1 Front Panel 3 2 2 Rear Panel 4 3 Installation 5 3 1 Installing the Device 5 3 2 Wiring 5 3 2 1 Ethernet Port 5 3 2 2 Console Port 6 3 2 3 SFP Port 7 3 2 4 GND 7 4 Quick Oper...

Page 7: ...powerful network management function Network management system supports iLinksView CLI web and network management software based on SNMP 1 2 Product Features Layer 2 network management PoE switch Sup...

Page 8: ...2 Figure 1 1 Networking...

Page 9: ...lt configuration 4 Console serial port Device debugging port 5 PoE power usage indicator Current power consumption display 6 Downlink indicator Current port link status and PoE status 7 Uplink port in...

Page 10: ...nsumption display 6 Downlink indicator Current port link status and PoE status 7 Uplink port indicator Link Act indicator 8 System indicator System status When device is booting up the light is flashi...

Page 11: ...J45 port Equipped with self adaptation function it can be automatically configured to full duplex half duplex operation mode and supports MDI MDI X self recognition function of the cable which means t...

Page 12: ...ows system for device configuration maintenance and management See Figure 3 5 for cable sequence of RJ 45 DB9 Figure 3 5 Cable sequence of RJ45 DB9 One end of RJ45 DB9 cable is RJ45 connector which ne...

Page 13: ...nd push it gently into the SFP slot till the SFP module is firmly connected to the slot both the top and bottom spring strip of the SFP module are firmly stuck with the SFP slot 3 2 4 GND Figure 3 8 G...

Page 14: ...PC Step 4 Run terminal simulation program on the PC and then select the serial port which is to connect the device set the terminal communication parameters The following parameter values have to be i...

Page 15: ...full license terms must have been made available to you Redboot comes with ABSOLUTELY NO WARRANTY Platform VCore III MIPS32 24KEc LUTON26 RAM 0x80000000 0x88000000 0x80028f20 0x87fdfffc available FLA...

Page 16: ...must be the same as that you have set in the iLinksView otherwise the iLinksView cannot discover the device 4 3 VLAN Configuration VLAN Virtual Local Area Network is frequently used during actual app...

Page 17: ...2 Gigabit Ethernet 1 2 Figure 4 2 VLAN networking Configuration Steps The switch configuration is shown as follows 1 Log in to the device Refer to 4 1 First Login by Console Port 2 Run the following...

Page 18: ...We suggest that you download and use the latest version of client software Nice to have recommendations to improve your device network security 1 Physical Protection We suggest that you perform physi...

Page 19: ...inder encrypted transmission will cause some loss in transmission efficiency 11 Secure Auditing Check online users we suggest that you check online users regularly to see if the device is logged in wi...

Reviews: